The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1049/iet-com.2017.0445
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of security performance of relay selection in underlay cognitive networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 26 publications
(42 reference statements)
0
11
0
Order By: Relevance
“…In [10] and [11], the SOP expressions were derived under Nakagami-m and Rayleigh fading channels, respectively. Moreover, the intercept probability (IP) was derived in [12] over Rayleigh fading conditions. Likewise, the secrecy performance of cooperative EH-CRNs has been investigated in [14]- [17].…”
Section: Introductionmentioning
confidence: 99%
“…In [10] and [11], the SOP expressions were derived under Nakagami-m and Rayleigh fading channels, respectively. Moreover, the intercept probability (IP) was derived in [12] over Rayleigh fading conditions. Likewise, the secrecy performance of cooperative EH-CRNs has been investigated in [14]- [17].…”
Section: Introductionmentioning
confidence: 99%
“…The PLS of multi-relays dual-hop CRNs was explored in [6]- [9]. Specifically, in [6] and [7], the communication was performed in the presence of only one eavesdropper attempting to overhear the communication channel, while multiple eavesdroppers were considered in [8] and [9]. Furthermore, In [6], optimal and suboptimal relay selection were analyzed while in [7] the relay that minimizes the signal-to-noise ratio (SNR) of the wiretap link was chosen.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, in [6] and [7], the communication was performed in the presence of only one eavesdropper attempting to overhear the communication channel, while multiple eavesdroppers were considered in [8] and [9]. Furthermore, In [6], optimal and suboptimal relay selection were analyzed while in [7] the relay that minimizes the signal-to-noise ratio (SNR) of the wiretap link was chosen. Besides, in [8], the most threatening eavesdropper is selected first according to the maximum SNR of the wiretap links between the source and the eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [25 -26], the effects of both proactive and reactive relay selection performance on Bit Error Rate (BER) are analyzed and studied in underlay CCN. Recently in [27][28][29][30], the security performance with relay selection methods under one or both of realistic operation conditions such as maximum transmit power constraint for unlicensed user's, or interference power constraint for licensed users are considered. The performance analysis of optimal decode-and-forward (DF) relay selection for the full-duplex (FD) mode in underlay cognitive radio (CR) networks is studied in [31], with the impact of critical parameters such as the residual self-interference, the distributions of the received signal-to-noise ratio (SNR) and the outage probability.…”
Section: Introductionmentioning
confidence: 99%